Affiliated institute
Abstract
The case below defines cyber security and highlights the application of cyber terrorism as an asymmetric attack against some portion of the nation’s critical infrastructure. The author also talks about the likely target critical infrastructure and who should be held responsible and clearly discusses the reasons behind.
Cyber Terrorism is indeed an asymmetric attack on a portion of the nation’s critical infrastructure. However, till date, we have yet to see attempts at crippling the infrastructure. The attempts seem to be directed with two motives. Stealing of financial data or sending across a message by infiltrating & defacing official websites of Govt. departments.
Hence in my opinion, the critical infrastructure that seems to be at stake at the financial corporations like Nationalized Banks, Insurance Companies, HMO seem to be at an elevated risk for the wealth of financial information they contain. The immediate second concern is of Healthcare & Information Technology systems as these contain virtual profile of residents / citizens.
In my opinion Government, in collaboration with Data Analysis & industry leading tech companies should be jointly responsible for devising a plan to thwart such attacks. Govt. can authorize use of higher-level automated surveillance systems to constantly monitor of suspicious activities on the information super-highway. I agree it’s like looking for a needle in a haystack, but constant efforts will at least cause the tourists to think twice before attempting a simple attack like Denial of Service (DoS).
No matter who the attacker is the responsibility should not shift & one central authority should be the one where the buck stops. Cyber terrorism moves at lightning fast speeds & time wasted in first trying to first know who is responsible & later approaching the authority will only ensure wastage of time. Further, having a single authority will ensure that the team is well trained & constantly updated with recognizing various patterns in the attackers methodologies & possibly identify an attack, before it gets out of hand.
References
1. Moteff J. and Parfomak P., Critical Infrastructure and Key assets: Definition and Identification, 1 October, 2004, Retrieved from Web http://www.fas.org/sgp/crs/RL32631.pdf
2. Windsor A. 2009, Critical Infrastructure Protection: The Importance Of a risk-based approach and stakeholder engagement, Retrieved from web, http://www.securitywatchindia.org.in/securitywatchindia/SelectedArticle.aspx?id=10
3. Berg N. 2011, An eye on cyber attacks on critical infrastructure, retrieved from web, 28 Nov 2011, http://www.theatlanticcities.com/technology/2011/11/infrastructure-cyberattacks/571/